All Talks

Spy versus Spy who is watching who

“Over the last 2 years we’ve analyzed and reverse-engineered a plethora of IoT-enabled surveillance cameras and spy cameras analyzing their app behaviors, cloud storage, network communications, data-at-rest, and hardware. In this spy vs. spy presentation, we reveal the unforeseen dark side of using these devices and their full capabilities. Wired and wireless packet captures will be analyzed, as well as the use of open source tools for anomalous behavior analysis substantiating the …

You might be interested in: